To understand the future let’s take a quick look at the past. Stonewall Jackson (Civil War), China Qin Dynasty Hand Prints 200 BC, Francis Dalton Finger Prints.
Do you want to know pros and cons with various authentication methods of the future? IRIS, Selfie Based Authentication, Voice, Finger Print, Face Recognition, Gesture and other Trends in Mobile Security.
What is the Best Biometric Authentication Methods for Mobile Apps?
In the following interview Hadi and I discuss Big Data Security Topics like the Mosaic Effect and Privacy, Mobile Security, The Demise of Passwords, IoT TOCTOU Attacks, Driverless Cars, Atomic Views of IoT, Orchestration Layer Limitations with Big Data Security, and what he describes as ‘Loose Membranes’ with IoT security.
I recently had a fascinating conversation with Hadi Nahari who is the Chief Security Architect at NVIDIA. He can be reached on Linkedin and Twitter.